CounterStorm, Inc. today announced the general availability of CounterStorm-1 version 2.0, the only internal network security solution that effectively defends organizations from targeted attacks and other internal network attacks. New enhancements enable organizations to have surgically precise visibility and mitigation capabilities, providing unmatched network protection from targeted attacks as well as slow, stealthy and sophisticated attacks.

"Attacks that target specific industries or companies are grossly under-reported, despite their increased use by hackers that are motivated by financial gain," said Yankee Group Vice President Zeus Kerravala. "Because targeted attacks are directed against a relatively small set of organizations and often bypass perimeter defenses, traditional security products often do not provide a meaningful defense. To that end, it is crucial to have an internal network security solution that provides real-time visibility and accurate identification, in addition to stopping of attacks without relying on signatures or patches."

To defend networks from targeted attacks and other security threats, CounterStorm-1 V2.0 provides customers with the following added benefits:

Unmatched Protection - The combination and correlation of CounterStorm-1's best-of-breed engines protects networks from targeted attacks as well as slow, stealthy and sophisticated attacks. This ensures protection against threats and malicious activity designed to evade traditional security solutions.

Unmatched Visibility - Internal network security events can be viewed in real-time and historically, thereby providing extreme visibility into security-specific events that were not viewable in the past. As a result, administrators are empowered to perform post-event forensics to determine the cause of the attack and complete a thorough investigation.

When organizations are targeted for attack, they often discover that their existing security infrastructures are unable to detect or stop attacks because they rely on signatures and patches to identify attacks. Most security solutions use attack signatures or patches to determine the presence of malicious activity and protect against it. However, in the case of targeted and zero-day attacks, attackers use sophisticated and covert methodologies for which signatures and patches have not yet been developed, exploiting the targeted organizations' vulnerabilities to extract confidential data.

"With their stealthy and sophisticated means of infection and propagation, targeted attacks are among the most challenging security problems facing enterprises today," said Gil Arbel, president and CEO of CounterStorm. "CounterStorm-1 delivers the technology needed to secure networks against targeted attacks. With this high level of sophistication and proven success, it is naturally capable of delivering protection from other attacks and worms such as botnets, root-kits, zero-day and known attacks."

CounterStorm-1 uses breakthrough technologies to achieve unprecedented accuracy and speed to immediately quarantine infected machines and prevent widespread damage. Its use of three separate but integrated engines immediately detects malicious network activity from users that have gained network access and provides administrators actionable visibility into the network. It also protects against hackers who specifically target companies and organizations with slow and stealthy methods of infiltration - a practice becoming more common among malicious hackers looking for valuable intellectual property, or personal data which can be sold on the black market.

About CounterStorm
CounterStorm, based in New York City, is the maker of CounterStorm-1, the only internal network security solution that effectively stops targeted and zero-day attacks in seconds. CounterStorm is the first network security company to simultaneously win two Small Business Innovative Research Phase II grants from the Department Homeland Security.

DHS selected CounterStorm's technology because it provides unprecedented protection against zero-day attacks. Global enterprises and government agencies use CounterStorm for the fastest and most accurate network protection available. For more information, please visit www.counterstorm.com.

Use of this site is governed by our Terms of Use and Privacy Policy.
Copyright 1996- Ziff Davis, LLC. All Rights Reserved.
Reproduction in whole or in part in any form or medium without express written permission
of Ziff Davis, LLC. is prohibited.PCMag Digital GroupAdChoice